Research: 59% expect IT security to be more secure in 2015
The majority of organizations expect to be more secure against security and privacy breaches this year, according to the latest Tech Pro Research survey.
Security and privacy are top concerns for many IT professionals, and it's especially relevant now, after 2014's highly publicized data breaches.
Companies around the world were victim to numerous bouts of malware, insider threats, stolen data and exploited vulnerabilities, many of which prompted urgent or emergency patches which disrupted IT departments and users alike. Big companies weren't immune to this plague, with Target and Home Depot suffering the sting of data breaches. Celebrities were also targeted, with compromised iCloud accounts resulting in personal photos being leaked online.
Because of the constant concerns about security and privacy, Tech Pro Research conducted a new survey on the topic and compared the results back to a previous survey from 2013.
Download the full Tech Pro Research report, IT Security and Privacy: Concerns, initiatives and predictions.
Security concerns
The numerous bouts of security and privacy breaches in 2014 were an obvious cause of concern to many, with 84% of survey respondents reporting an increase in security and privacy concerns for this year, compared to 2014. It's clear that almost everyone anticipates the need to prepare for security struggles in the upcoming months.
Many are confident that they will be able to handle the security threats, with 59% of respondents expecting to be more secure in 2015 and 32% predicting no change in their organization's security and privacy. Only 9% expect to be less secure than in 2014.
Security and privacy breaches
The survey found that 35% of organizations had experienced some type of security or privacy breach in 2014, with 11% reporting that it was a major breach, and 24% describing it as minor. Large companies and small companies were both affected by breaches, and larger companies with more than 1,000 employees were slightly more likely to have experienced a breach, with 40% experiencing a security breach, compared to 32% of companies with fewer than 50 employees.
And the industry most impacted was government, with education reporting no major breaches at all, and being better at blocking incidents than any other industry.
Security budgets
It's not a surprise that half of respondents stated their security budgets would increase, but it is somewhat unexpected that only 15% reported significant increases. About a third stated slight increases were underway.
Given the anything goes nature of 2014 security breaches - which should have been a wake-up call for any organization too distracted or complacent to take security seriously - one might expect higher spikes in funding. The fact nearly half of respondents stated their budgets would remain the same indicate that the ability to allocate significant security budget increases is rare. This is corroborated by the fact 34% of respondents felt lack of security budgeting would be a security challenge in 2015. It may also be that some respondent organizations felt they were doing well with what they had. Very few reported decreases in security funding; this isn't a priority which is expected to die down anytime soon.
The report shows that security and privacy are clearly full of challenges for companies that want to protect their data and assets from security and privacy violations. But, the report shows that confidence levels and planned projects mean that most respondents and their organizations feel up to the task.
Other topics covered in the report include:
- Outsourcing security plans
- Incident response plans
- Risk management strategies
- Security challenges
- Budgeting priorities
- Methods of protecting company data
- Scheduled and completed security projects
Download the full Tech Pro Research report, IT Security and Privacy: Concerns, initiatives and predictions.
More From Tech Pro Research
-
Downloads
Kubernetes: A guide for IT pros and business leaders
Kubernetes enables the deployment, scaling, and management of containerized applications. This ebook explains why the ecosystem matters, ways to take advantage of it, and how it may contribute to the ...
-
eBooks
Top cloud providers 2019: A leader’s guide to the major players
Competition in the cloud computing space is heating up this year. This ebook offers a look at the relative merits, advantages, and shortcomings of the most prominent contenders. From the ebook: T...
-
Tools & Templates
Telecommuting policy
As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern empl...
-
Tools & Templates
Feature comparison: Data analytics software and services
Finding the best data analytics software, services, and tools for your business requires extended research and a systematic evaluation of features. This download includes an overview of factors to con...
-
eBooks
Spectre and Meltdown: An insider’s guide
Design flaws in modern chip design have emerged as a significant threat to the security of data on PCs and mobile devices. This comprehensive ebook delves into two prominent vulnerabilities—Spectre an...
-
Tools & Templates
Comparison chart: VPN service providers
Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders a...
-
Downloads
5G Research Report 2019: The enterprise is eager to adopt, despite cost concerns and availability
5G: The next-generation wireless network is finally a reality, and businesses remain eager to embrace this new technology. 5G will be popularized via telecom carriers and the marketing of wire-cutting...
-
eBooks
IoT security: A guide for IT leaders
The Internet of Things is delivering data and helpful insights to organizations around the world--but it has also introduced new and potentially devastating vulnerabilities. This ebook offers a compre...
-
Tools & Templates
Resource and data recovery policy
Employees, data, and resources are three of the biggest assets in any organization. All employees should be familiar with the processes for recovering information if it becomes lost, inaccessible, or ...
-
Tools & Templates
Feature comparison: CRM software and services
Choosing a CRM solution requires strategy, thoughtful consideration, and more than a little research. These guidelines and comparison tool provide a customizable framework your business can use to fin...
-
eBooks
Six Steps to A Secure and Robust Remote Access
The days of users studiously working at their office desks, using terminals or desktops, is quickly vanishing. This product outlines six steps for you to enforce policies and maintain regulatory comp...
-
Tools & Templates
Social media policy
Every employee has an opportunity to express and communicate online in many ways, and the organization encourages an online presence. But above all else, they need to use good judgment on what materia...
-
Tools & Templates
Acceptable Use Policy: Equipment
Employees rely on IT to provide the equipment they need to get things done. TechRepublic's Acceptable Use Policy: Equipment assists in directing employees to use that equipment safely and within orga...
-
eBooks
IT Professional's Guide to Supporting Apple in the Enterprise
From Mac OS X and iOS to the iPhone and iPad, TechRepublic's IT Professional's Guide to Supporting Apple in the Enterprise will help you deploy, optimize, and securely manage Apple hardware and softw...
-
Tools & Templates
Nondisclosure policy
This policy outlines the measures the organization is taking to ensure protection of its confidential information, including the imposition of a contractual obligation in the form of a nondisclosure a...
-
Tools & Templates
IT consultant code of conduct
This document is designed to serve as a template that technology consultants and consulting firms can use to create a standardized ethical, professional, and behavioral code of conduct for its employe...
-
Tools & Templates
Client Due Diligence Report
TechRepublic's sample Client Due Diligence Report will help you develop effective client relationships, ensuring your consultancy understands the client's operational requirements, network architectu...
-
eBooks
Risk Management: Enabling the Business
Determining how much risk is acceptable and implementing controls to meet expectations of managers, customers, investors, and employees is a common business practice. TechRepublic's sample Risk Manag...
-
Tools & Templates
IT physical security policy
This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or da...
-
Tools & Templates
Electronic data retention policy
This policy is designed to help you define requirements and implement practices for ensuring that electronic data is safeguarded in compliance with all applicable laws, rules, and regulations. From t...
-
eBooks
Six Steps to A Secure and Robust Remote Access
The days of users studiously working at their office desks, using terminals or desktops, is quickly vanishing. This product outlines six steps for you to enforce policies and maintain regulatory comp...
-
Tools & Templates
Social media policy
Every employee has an opportunity to express and communicate online in many ways, and the organization encourages an online presence. But above all else, they need to use good judgment on what materia...
-
Tools & Templates
Acceptable Use Policy: Equipment
Employees rely on IT to provide the equipment they need to get things done. TechRepublic's Acceptable Use Policy: Equipment assists in directing employees to use that equipment safely and within orga...
-
eBooks
IT Professional's Guide to Supporting Apple in the Enterprise
From Mac OS X and iOS to the iPhone and iPad, TechRepublic's IT Professional's Guide to Supporting Apple in the Enterprise will help you deploy, optimize, and securely manage Apple hardware and softw...
-
Tools & Templates
Nondisclosure policy
This policy outlines the measures the organization is taking to ensure protection of its confidential information, including the imposition of a contractual obligation in the form of a nondisclosure a...
-
Tools & Templates
IT consultant code of conduct
This document is designed to serve as a template that technology consultants and consulting firms can use to create a standardized ethical, professional, and behavioral code of conduct for its employe...
-
Tools & Templates
Client Due Diligence Report
TechRepublic's sample Client Due Diligence Report will help you develop effective client relationships, ensuring your consultancy understands the client's operational requirements, network architectu...
-
eBooks
Risk Management: Enabling the Business
Determining how much risk is acceptable and implementing controls to meet expectations of managers, customers, investors, and employees is a common business practice. TechRepublic's sample Risk Manag...
-
Tools & Templates
IT physical security policy
This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or da...
-
Tools & Templates
Electronic data retention policy
This policy is designed to help you define requirements and implement practices for ensuring that electronic data is safeguarded in compliance with all applicable laws, rules, and regulations. From t...